Diffie-Hellman in the Air: A Link Layer Approach for In-Band Wireless Pairing

01/28/2019
by   Wenlong Shen, et al.
0

Key establishment is one fundamental issue in wireless security. The widely used Diffie-Hellman key exchange is vulnerable to the man-in-the-middle attack. This paper presents a novel in-band solution for defending the man-in-the-middle attack during the key establishment process for wireless devices. Our solution is based on the insight that an attacker inevitably affects the link layer behavior of the wireless channel, and this behavior change introduced by the attacker can be detected by the legitimate users. Specifically, we propose a key exchange protocol and its corresponding channel access mechanism for the protocol message transmission, in which the Diffie-Hellman parameter is transmitted multiple times in a row without being interrupted by other data transmission on the same wireless channel. The proposed key exchange protocol forces the MITM attacker to cause multiple packet collisions consecutively at the receiver side, which can then be monitored by the proposed detection algorithm. The performance of the proposed solution is validated through both theoretical analysis and simulation: the proposed solution is secure against the MITM attack and can achieve an arbitrarily low false positive ratio. This proposed link layer solution works completely in-band, and can be easily implemented on off-the-shelf wireless devices without the requirement of any special hardware.

READ FULL TEXT

page 1

page 7

research
08/14/2016

An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks

Avionics networks rely on a set of stringent reliability and safety requ...
research
02/14/2018

Analysing and Patching SPEKE in ISO/IEC

Simple Password Exponential Key Exchange (SPEKE) is a well-known Passwor...
research
04/30/2023

Breaking Blockchain Rationality with Out-of-Band Collusion

Blockchain systems often rely on rationality assumptions for their secur...
research
06/02/2022

First demonstration of a post-quantum key-exchange with a nanosatellite

We demonstrate a post-quantum key-exchange with the nanosatellite SpooQy...
research
02/16/2023

PACMAN Attack: A Mobility-Powered Attack in Private 5G-Enabled Industrial Automation System

3GPP has introduced Private 5G to support the next-generation industrial...
research
09/20/2022

CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks

Current research in the automotive domain has proven the limitations of ...
research
09/29/2018

Statistical Inference Attack Against PHY-layer Key Extraction and Countermeasures

The formal theoretical analysis on channel correlations in both real ind...

Please sign up or login with your details

Forgot password? Click here to reset